• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

SecureDAV: a secure data aggregation and verification protocol for sensor networks,” GLOBECOM (2004)

by A Mahimkar, T Rappaport
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 39
Next 10 →

SIA: secure information aggregation in sensor networks

by Haowen Chan, Dawn Song - Proc. of of ACM SenSys 2003 , 2003
"... ..."
Abstract - Cited by 31 (1 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...r [36] studied what aggregation functions may be more resilient against malicious attacks. Jadia and Mathuria [23] extend the approach of Hu and Evans by incorporating privacy. Mahimkar and Rappaport =-=[29]-=- also propose an aggregation-verification scheme for the single-aggregator model using a secret-sharing scheme. Du et al. [13] propose using multiple witness nodes as additional aggregators to verify ...

Secure data aggregation in wireless sensor networks: A survey

by Yingpeng Sang, Yasushi Inoguchi, Yasuo Tan, Naixue Xiong, Hong Shen - In Proc. of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT ’06 , 2006
"... Data aggregation is a widely used technique in wirelss sensor networks. The security issues, data confidentiality and integrity, in data aggregation become vital when the sensor network is deployed in a hostile environment. There has been many related work proposed to address these security issues. ..."
Abstract - Cited by 18 (0 self) - Add to MetaCart
Data aggregation is a widely used technique in wirelss sensor networks. The security issues, data confidentiality and integrity, in data aggregation become vital when the sensor network is deployed in a hostile environment. There has been many related work proposed to address these security issues. In this paper we survey these work and classify them into two cases: hop-by-hop encrypted data aggregation and end-to-end encrypted data aggregation. We also propose two general frameworks for the two cases respectively. The framework for end-to-end encrypted data aggregation has higher computation cost on the sensor nodes, but achieves stronger security, in comparison with the framework for hop-by-hop encrypted data aggregation. 1.
(Show Context)

Citation Context

...ise key distribution: In [2], a symmetric key can be generated among t nodes by evaluating a symmetric multivariate polynomial P (x1, ..., xt) at each node. Asymmetric group-wise key distribution: In =-=[18]-=-, the memory of each sensor node is pre-loaded with the ECC (elliptic curve cryptography) domain parameters. After deployment, each sensor will compute its EC-public/private key pair and broadcast its...

Secure Data Aggregation in Wireless Sensor Network: a survey

by Hani Alzaid, Ernest Foo, Juan Gonzalez Nieto
"... Recent advances in wireless sensor networks (WSNs) have led to many new promising applications including habitat monitoring and target tracking. However, data communication between nodes consumes a large portion of the total energy consumption of the WSNs. Consequently, data aggregation techniques c ..."
Abstract - Cited by 18 (1 self) - Add to MetaCart
Recent advances in wireless sensor networks (WSNs) have led to many new promising applications including habitat monitoring and target tracking. However, data communication between nodes consumes a large portion of the total energy consumption of the WSNs. Consequently, data aggregation techniques can greatly help to reduce the energy consumption by eliminating redundant data traveling back to the base station. The security issues such as data integrity, confidentiality, and freshness in data aggregation become crucial when the WSN is deployed in a remote or hostile environment where sensors are prone to node failures and compromises. There is currently research potential in securing data aggregation in the WSN. With this in mind, the security issues in data aggregation for the WSN will be discussed in this paper. Then, the adversarial model that can be used in any aggregation scheme will be explained. After that, the ”state-of-the-art ” proposed secure data aggregation schemes will be surveyed and then classified into two categories based on the number of aggregator nodes and the existence of the verification phase. Finally, a conceptual framework will be proposed to provide new designs with the minimum security requirements against certain type of adversary. This framework gives a better understanding of those schemes and facilitates the evaluation process.
(Show Context)

Citation Context

... as well as the aggregated result to the base station. Since the aggregator point is fixed and responsible to handle so much traffic, the aggregator resources will not last long. Moreover, SecureDAV (=-=Mahimkar & Rappaport 2004-=-) improved the data integrity vulnerability in SDA and ESA by signing the aggregated data. In SecureDAV, each sensor within a cluster will have its share of its secret cluster key and then it will be ...

Secure and highly-available aggregation queries in large-scale sensor networks via set sampling

by Haifeng Yu - In ACM/IEEE IPSN , 2009
"... Wireless sensor networks are often queried for aggregates such as predicate count, sum, and average. In untrusted environments, sensors may potentially be compromised. Existing approaches for securely answering aggregation queries in untrusted sensor networks can detect whether the aggregation resul ..."
Abstract - Cited by 12 (3 self) - Add to MetaCart
Wireless sensor networks are often queried for aggregates such as predicate count, sum, and average. In untrusted environments, sensors may potentially be compromised. Existing approaches for securely answering aggregation queries in untrusted sensor networks can detect whether the aggregation result is corrupted by an attacker. However, the attacker (controlling the compromised sensors) can keep corrupting the result, rendering the system unavailable. This paper aims to enable aggregation queries to tolerate instead of just detecting the adversary. To this end, we propose a novel tree sampling algorithm that directly uses sampling to answer aggregation queries. It leverages a novel set sampling technique to overcome a key and well-known obstacle in sampling — traditional sampling technique is only effective when the predicate count or sum is large. Set sampling can efficiently sample a set of sensors together, and determine whether any sensor in the set satisfies the predicate (but not how many). With set sampling as a building block, tree sampling can provably generate a correct answer despite adversarial interference, while without the drawbacks of traditional sampling techniques.
(Show Context)

Citation Context

...much more serious since even a single malicious sensor can completely corrupt the final result. Thus the need to make aggregation queries secure against the second attack has been widely acknowledged =-=[1, 2, 6, 10, 14, 15, 17, 25, 26]-=-. Previous results and motivation. Most pioneering efforts [1, 6, 14, 15, 17] on secure aggregation queries make strong restrictive assumptions (e.g., assuming a single malicious sensor [14, 15] or as...

iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks

by Wenbo He, Hoang Nguyen, Xue Liu, Klara Nahrstedt, Tarek Abdelzaher
"... Abstract — Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/injection by adversaries. Hence, h ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
Abstract — Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/injection by adversaries. Hence, how to protect data privacy and data integrity are two major challenges for data aggregation in wireless sensor networks. In this paper, we present iPDA — an integrity-protecting private data aggregation scheme. In iPDA, data privacy is achieved through data slicing and assembling technique; and data integrity is achieved through redundancy by constructing disjoint aggregation paths/trees to collect data of interests. In iPDA, the data integrity-protection and data privacy-preservation mechanisms work synergistically. We evaluate the performance of iPDA scheme in terms of communication overhead and data aggregation accuracy, comparing with a typical data aggregation scheme – TAG, where no integrity protection and privacy preservation is provided. Simulation results show that iPDA achieves the design goals while still maintains the efficiency of data aggregation. 1 I.
(Show Context)

Citation Context

... where aggregation result is destined. In this paper, we only consider a single base station case. iPDA is readily extensible to multiple base station cases. In general data aggregation protocols [1] =-=[5]-=- [6], aggregation trees root at the base station are usually constructed. The non-leaf nodes, except the root, in the aggregation tree serve as intermediate aggregators. They are responsible for forwa...

Efficient Security Primitives Derived from a Secure Aggregation Algorithm

by Haowen Chan, Adrian Perrig - CCS'08 , 2008
"... By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionality which we use to generate various efficient network security primitives, including: a signature scheme ensuring authent ..."
Abstract - Cited by 9 (2 self) - Add to MetaCart
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionality which we use to generate various efficient network security primitives, including: a signature scheme ensuring authenticity, integrity and non-repudiation for arbitrary node-to-node communications; an efficient broadcast authentication algorithm not requiring time synchronization; a scheme for managing public keys in a sensor network without requiring any asymmetric cryptographic operations to verify the validity of public keys, and without requiring nodes to maintain node revocation lists. Each of these applications uses the same basic data aggregation primitive and thus have O(log n) congestion performance and require only that symmetric secret keys are shared between each node and the base station. We thus observe the fact that the optimizations developed in the application area of secure aggregation can feed back into creating more optimized versions of highly general, basic security functions.

People-Centric Urban Sensing: Security Challenges for the New Paradigm. Dartmouth

by Peter Johnson, Apu Kapadia, David Kotz, Nikos Triandopoulos , 2007
"... We study the security challenges that arise in people-centric urban sensing, a new sensor-networking paradigm that leverages humans as part of the sensing infrastructure. Most prior work on sensor networks has focused on collecting and processing ephemeral data about the environment using a static t ..."
Abstract - Cited by 9 (2 self) - Add to MetaCart
We study the security challenges that arise in people-centric urban sensing, a new sensor-networking paradigm that leverages humans as part of the sensing infrastructure. Most prior work on sensor networks has focused on collecting and processing ephemeral data about the environment using a static topology and an application-aware infrastructure. People-centric urban sensing, however, involves collecting, storing, processing and fusing large volumes of data related to every-day human activities. Sensing is performed in a highly dynamic and mobile environment, and supports (among other things) pervasive computing applications that are focused on enhancing the user’s experience. In such a setting, where humans are the central focus, there are new challenges for information security; not only because of the complex and dynamic communication patterns, but also because the data originates from sensors that are carried by a person—not a tiny sensor thrown in the forest or mounted on the neck of an animal. In this paper we aim to instigate discussion about this critical issue—because peoplecentric sensing will never succeed without adequate provisions for security and privacy. To that end, we outline several important challenges and suggest general solutions that hold promise in this new paradigm of sensor networks.
(Show Context)

Citation Context

...in the presence of single [27, 31] or multiple [8, 47] adversarial sensor nodes. Also, different models of in-network data aggregation have been considered, including the star-based aggregation model =-=[14, 39, 47]-=- and the tree-based aggregation model [8, 61]. Aggregation of encrypted data is studied in [5, 7, 21]. 10sUnfortunately, these solutions are not feasible for mobile sensor networks. First, previous au...

FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks ∗

by Emiliano De Cristofaro, Jens-matthias Bohli, Dirk Westhoff , 901
"... Abstract. This work introduces FAIR, a novel framework for Fuzzy-based Aggregation providing In-network Resilience for Wireless Sensor Networks. FAIR addresses the possibility of malicious aggregator nodes manipulating data. It provides data-integrity based on a trust level of the WSN response and i ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
Abstract. This work introduces FAIR, a novel framework for Fuzzy-based Aggregation providing In-network Resilience for Wireless Sensor Networks. FAIR addresses the possibility of malicious aggregator nodes manipulating data. It provides data-integrity based on a trust level of the WSN response and it tolerates link or node failures. Compared to available solutions, it offers a general aggregation model and makes the trust level visible to the querier. We classify the proposed approach as complementary to protocols ensuring resilience against sensor leaf nodes providing faulty data. Thanks to our flexible resilient framework and due to the use of Fuzzy Inference Schemes, we achieve promising results within a short design cycle. 1
(Show Context)

Citation Context

...rotocols do also not tolerate any failure, only recent proposals of Haghani et al. [23] and Taban et al. [38] bring in capabilities to detect malicious nodes as a way to provide robustness. SecureDAV =-=[28]-=- uses threshold public key cryptography, which we argue to be not suitable in a sensor network. Another way, that is followed by FAIR, is to base the integrity on witness nodes [16]. Robustness can be...

Dydap: A dynamic data aggregation scheme for privacy aware wireless sensor networks

by Sabrina Sicari, Luigi Alfredo Grieco, Gennaro Boggia, Alberto Coen-porisini - Elsevier Journal of Systems & Software 85 (1) (2012) 152
"... End-to-end data aggregation, without degrading sensing accuracy, is a very relevant issue in Wireless Sensor Networks (WSN) that can prevent network congestion to occur. Moreover, privacy management requires that anonymity and data integrity are preserved in such networs. Unfortunately, no integrate ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
End-to-end data aggregation, without degrading sensing accuracy, is a very relevant issue in Wireless Sensor Networks (WSN) that can prevent network congestion to occur. Moreover, privacy management requires that anonymity and data integrity are preserved in such networs. Unfortunately, no integrated solutions have been proposed so far, able to tackle both issues in a unified and general environment. To bridge this gap, in this paper we present an approach for dynamic secure end-to-end data aggregation with privacy function, named DyDAP. It has been designed starting from a UML model that encompasses the most important building blocks of a privacy-aware WSN, including aggregation policies. Furthermore, it introduces an original aggregation algorithm that, using a discrete-time control loop, is able to dynamically handle in-network data fusion to reduce the communication load. The performance of the proposed scheme has been verified using computer simulations, showing that DyDAP avoids network congestion and therefore improves WSN estimation accuracy while, at the same time, guaranteeing anonymity and data integrity.
(Show Context)

Citation Context

...oach is that it can cause network congestion [3] and as a consequence some information may get lost. To avoid network congestion one solution consists in using proper in-network algorithms (e.g., see =-=[4, 5, 6, 7]-=-) that can reduce significantly the number of bytes exchanged across the WSN by aggregating data [8, 9, 10]. In fact, in many situations, what is needed are aggregated measures, such as the average te...

Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless Sensor Networks

by Esam Mlaih, Salah A. Aly , 803
"... Abstract—In-network data aggregation is an essential technique in mission critical wireless sensor networks (WSNs) for achieving effective transmission and hence better power conservation. Common security protocols for aggregated WSNs are either hop-by-hop or end-to-end, each of which has its own en ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Abstract—In-network data aggregation is an essential technique in mission critical wireless sensor networks (WSNs) for achieving effective transmission and hence better power conservation. Common security protocols for aggregated WSNs are either hop-by-hop or end-to-end, each of which has its own encryption schemes considering different security primitives. End-to-end encrypted data aggregation protocols introduce maximum data secrecy with in-efficient data aggregation and more vulnerability to active attacks, while hop-by-hop data aggregation protocols introduce maximum data integrity with efficient data aggregation and more vulnerability to passive attacks. In this paper, we propose a secure aggregation protocol for aggregated WSNs deployed in hostile environments in which dual attack modes are present. Our proposed protocol is a blend of flexible data aggregation as in hop-by-hop protocols and optimal data confidentiality as in end-to-end protocols. Our protocol introduces an efficient O(1) heuristic for checking data integrity along with cost-effective heuristic-based divide and conquer attestation process which is O(ln n) in average-O(n) in the worst scenario- for further verification of aggregated results. I.
(Show Context)

Citation Context

...schemes raise power consumption concerns, since computation requirements for public key encryption is still considered high for WSNs [12]. Many hop-by-hop aggregation protocols in WSNs like [3], [6], =-=[9]-=-, [13], [17], provide more efficient aggregation operations and highly consider data integrity. However, since sensed data being passed to non-leaf aggregators are revealed for the sake of middle-way ...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University